Wireless (Los Mejores Trucos)

Overview

It's an increasingly wired world, but many people are finding that the best way to get connected is to do away with wires entirely. From cable replacement to universal Internet connectivity, wireless technology is changing the way we connect to our machines and to each other.

As with any new technology, buying your gear is only the first step. Understanding how to make the best use of it is another story. Wireless Hacks offers 100 industrial-strength tips about wireless ...

See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (6) from $1.99   
  • New (2) from $11.60   
  • Used (4) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$11.60
Seller since 2014

Feedback rating:

(5)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
8441516472 Clean unmarked pages; binding tight. Ships within 24 hours with delivery confirmation.

Ships from: Beachwood, OH

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$15.88
Seller since 2009

Feedback rating:

(847)

Condition: New
8441516472 *BRAND NEW* Ships Same Day or Next!

Ships from: Springfield, VA

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

It's an increasingly wired world, but many people are finding that the best way to get connected is to do away with wires entirely. From cable replacement to universal Internet connectivity, wireless technology is changing the way we connect to our machines and to each other.

As with any new technology, buying your gear is only the first step. Understanding how to make the best use of it is another story. Wireless Hacks offers 100 industrial-strength tips about wireless networking, contributed by experts who apply what they know in the real world every day. Each Hack can be read in just a few minutes, but can save you hours of research.

Inside, you will find a wealth of useful techniques for making the most out of wireless technology, including:

  • Making sense of the alphabet soup of the 802.11 standards, and understanding which technology makes sense for your solving particular problem
  • Using Bluetooth, mobile radios, mobile data networks, and other exotic methods to keep you connected, no matter where you are
  • Practical methods for detecting, analyzing, and monitoring wireless networks
  • Extending the range of your network, and making the best possible use of the available radio spectrum
  • Designing and building your own antennas
  • Engineering long distance network links that span several miles
  • Understanding the security issues of wireless networking, and protecting yourself and your users from unauthorized access and eavesdropping

Written for the intermediate to advanced wireless user, Wireless Hacks is full of direct, practical, ingenious solutions to real-world networking problems. Whether your wireless network needs to extend to the edge of your office or to the other end of town, this collection of non-obvious, "from the field" techniques will show you how to get the job done.
Read More Show Less

Product Details

  • ISBN-13: 9788441516472
  • Publisher: O'Reilly Media, Incorporated
  • Publication date: 5/21/2004
  • Series: Los Mejores Trucos Serie
  • Edition description: Spanish-language Edition
  • Pages: 304
  • Product dimensions: 6.82 (w) x 8.88 (h) x 0.70 (d)

Meet the Author

Rob Flickenger has been a professional systems administrator for more than 10 years, and all around hacker for as long as he can remember. Rob enjoys spreading the good word of open networks, open standards, and ubiquitous wireless networking. His current professional project is Metrix Communication LLC, which provides wireless hardware and software that embodies the same open source principles he rants about in his books. Rob also works with the U.N. and various international organizations to bring these ideas to places where communications infrastructure is badly needed. He hopes that all of this effort is contributing toward the ultimate goal of infinite bandwidth everywhere for free. He is the author of Linux Server Hacks, Wireless Hacks, and Building Wireless Community Networks (which is in its second edition).

Read More Show Less

Table of Contents

Prologo 15
Introduccion 19
Por que trucos inalambricos? 20
Como utilizar este libro 20
Como esta organizado este libro 20
Convenciones utilizadas en este libro 22
Capitulo 1. Los estandares 25
1. 802.11: la madre de Ethernet inalambrica del IEEE 25
Ventajas 26
Inconvenientes 26
Recomendaciones 26
2. 802.11a: el Betamax de la familia 802.11 27
Ventajas 27
Inconvenientes 27
Recomendaciones 28
3. 802.11b: el estandar de facto 29
Ventajas 29
Inconvenientes 29
Recomendaciones 30
4. 802.11g: similar a 802.11b pero mas rapido 30
Ventajas 30
Inconvenientes 31
Recomendaciones 31
5. 802.16: infraestructura inalambrica de larga distancia 31
Ventajas 32
Inconvenientes 32
Recomendaciones 32
6. Bluetooth: sustituto de los cables para los dispositivos 32
Ventajas 33
Inconvenientes 33
Recomendaciones 33
7. 900 MHz: velocidad lenta, mejor cobertura 34
Ventajas 35
Inconvenientes 35
Recomendaciones 35
8. CDPD, 1xRTT y GPRS: redes de datos celulares 35
CDPD en TDMA 36
1xRTT en CDMA 36
GPRS en GSM 37
9. FRS y GMRS: super walkie-talkies 37
FRS 38
GMRS 39
Ampliar el alcance 40
10. 802.1x: seguridad de puertos para comunicaciones en red 40
11. HPNA y Powerline Ethernet 42
HPNA 42
Ventajas 42
Inconvenientes 42
Recomendaciones 43
Powerline Ethernet 43
Ventajas 43
Inconvenientes 43
Recomendaciones 44
12. BSS frente a IBSS 44
Capitulo 2. Bluetooth y datos moviles 47
13. Control remoto de OS X con un telefono sony Ericsson 48
14. SMS con un teclado real 50
15. Fotografias automaticas con el Nokia 3650 53
El codigo 54
Ejecutar el truco 56
Vease tambien 57
16. Usar Bluetooth con Linux 57
17. Bluetooth a GPRS en Linux 60
18. Transferencias de archivos Bluetooth en Linux 65
19. Controlar XMMS con Bluetooth 70
Capitulo 3. Monitorizacion de redes 73
20. Buscar todas las redes inalambricas disponibles 73
Windows XP 74
Mac OS X 76
Linux 79
21. Busqueda de redes con NetStumbler 80
22. Deteccion de redes en Mac OS X 84
MacStumbler 85
iStumbler 85
23. Deteccion de redes con PC manuales 86
24. Escaneo pasivo con KisMAC 89
25. Establecer la conectividad 92
Usar traceroute 96
26. Descubrir clientes inalambricos con ping 98
27. Buscar fabricantes de radios por direccion MAC 99
El codigo 100
Ejecutar el truco 101
28. Anuncios del servicio Rendezvous en Linux 101
29. Anunciar servicios Rendezvous arbitrarios en OS X 104
30. "Presentado por" Rendezvous Ad Redirector 106
31. Deteccion de redes con Kismet 107
Instalacion 108
Ejecutar Kismet 109
Limpieza 111
Vease tambien 111
32. Ejecutar Kismet en Mac OS X 112
33. Monitorizacion de enlaces en Linux con Wavemon 114
34. Monitorizacion del estado historico de los enlaces 115
35. EtherPEG y DriftNet 120
EtherPEG 120
DriftNet 122
36. Estimar el rendimiento de la red 123
37. Vigilar el trafico con tcpdump 125
38. Analisis visual del trafico con Ethereal 127
39. Realizar el seguimiento de tramas 802.11 en Ethereal 129
40. Interrogar la red con nmap 133
41. Monitorizacion de redes con ngrep 134
El codigo 135
Ejecutar el truco 136
42. Ejecutar ntop para obtener estadisticas de una red en tiempo real 137
Capitulo 4. Trucos de hardware 141
43. Antenas complementarias para portatiles 142
44. Incrementar el alcance de Titanium PowerBook 143
45. Actualizaciones WET11 145
Anadir una antena 145
Actualizar la radio 146
Utilizar pilas 146
46. AirPort Linux 147
Instalacion 148
Actualizar AirPort 149
Recuperar la configuracion original 150
47. Java Configurator para puntos de acceso AirPort 150
Acceso LAN local 152
Configurar el marcado telefonico 152
NAT y DHCP 153
Creacion de puentes 154
WEP, filtrado MAC y redes cerradas 154
Itinerancia 155
Guardar los cambios 156
48. Estacion base de software de Apple 156
49. Anadir una antena a AirPort 158
50. La luz nocturna NoCat 161
51. Construya su propio hardware de punto de acceso 164
52. Disco duro Compact Flash 168
53. Pebble 170
54. Tuneles: encapsulacion IPIP 171
Vease tambien 173
55. Tuneles: encapsulacion GRE 173
Vease tambien 175
56. Ejecutar su propio dominio de nivel superior 175
57. Empezar a utilizar Host AP 177
PCMCIA 177
PCI 179
58. Convierta Host AP en un puente de Nivel 2 180
Advertencias 181
Vease tambien 182
59. Puentes con cortafuegos 182
Parchear el nucleo Linux 2.4 182
Configurar un cortafuegos 183
60. Filtrado MAC con Host AP 183
61. Hermes AP 185
62. Guia de cables microondas 186
63. Conectores microondas 188
64. Guia de antenas 192
Omnidireccionales 192
Sectoriales 193
Yagi 194
Guia-ondas y antenas artesanales 195
Antenas parabolicas 196
Combinar todos los elementos 196
65. Grafico de referencia de prestaciones cliente 197
66. Adaptadores pigtail 199
67. Proveedores de hardware 802.11 201
68. Alimentacion artesanal por medio de Ethernet 202
Paso a paso 203
69. Montajes en tejados sencillos pero eficaces 205
Capitulo 5. Antenas artesanales 211
70. Reflector parabolico cilindrico de plato grande 213
71. La antena omnidireccional Arana 216
72. Guia-ondas con una lata de Pringles 217
Construccion del colector frontal 219
Preparacion de la lata 220
Construccion de los elementos 221
73. Guia-ondas de lata de barquillos 223
Vease tambien 223
74. Plato Primestar con alimentacion guia-ondas 224
Consideraciones adicionales 226
IEEE 802.11a 227
75. Alimentador Biquad para un plato Primestar 227
Construccion del biquad 227
Antena Biquad para radios moviles PCS 229
76. Antena omnidireccional de fragmentos de cable 230
Cortar los fragmentos 231
Crear una plantilla 233
Descargo de responsabilidades 235
77. Guia-ondas ranuradas 235
Como funciona una antena guia-ondas 236
Antenas guia-ondas unidireccionales 236
Antenas guia-ondas ranuradas omnidireccionales 237
Antenas guia-ondas ranuradas altamente direccionales 238
Detalles para construir la antena unidireccional de ocho ranuras 238
Acoplar la senal a la guia-ondas 239
Antena omnidireccional de 8 + 8 ranuras 240
Antena unidireccional de ocho ranuras 240
Detalles para la construccion de un diseno de 16 y de 16 + 16 ranuras 241
78. El repetidor pasivo 241
79. Determinar la ganancia de una antena 244
Capitulo 6. Enlaces de larga distancia 249
80. Establecer la linea de vision 249
Utilizar un GPS para registrar latitudes, longitudes y altitudes 250
Representar los puntos en un mapa 3D 251
81. Calcular el presupuesto de un enlace 252
82. Alineacion de antenas a larga distancia 254
83. Frenar para acelerar 256
84. Aprovechar las ventajas de la polarizacion de antenas 257
85. Reproduzca el entorno inalambrico con mapas NoCat 258
Capitulo 7. Seguridad inalambrica 263
86. Sacar el maximo partido a WEP 264
Vease tambien 266
87. Destierre el mito de la seguridad inalambrica 267
Entorno de las pruebas 267
Paso 1. Detectar la red 268
Paso 2. Buscar una direccion MAC valida 269
Paso 3. Descifrar la clave WEP 269
Paso 4. Iniciar sesion 270
Conclusion 271
88. Descifrar WEP con AirSnort: la forma sencilla 271
89. Portal cautivo NoCatAuth 273
90. NoCatSplash y Cheshire 276
91. Proxy Squid sobre SSH 278
92. Proxy SSH SOCKS 4 280
Acerca de DNS 281
93. Redireccionamiento de puertos sobre SSH 283
Vease tambien 285
94. Inicios de sesion rapidos con claves SSH cliente 286
Aspectos de seguridad 287
95. Inicios de sesion SSH en modo turbo 287
96. OpenSSH en Windows gracias a Cygwin 289
Instalacion 289
Configuracion de OpenSSH 292
97. Compatibilidad de ubicaciones para tuneles en OS X 293
98. Uso de vtun en SSH 295
Trucos y consejos 300
99. Generador vtund.conf automatico 301
El codigo 302
100. Realizar el seguimiento de usuarios inalambricos con arpwatch 306
Apendice 311
Indice alfabetico 313
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)